Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.243.9.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12524
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.243.9.142.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:50:04 CST 2022
;; MSG SIZE  rcvd: 105
Host info
142.9.243.85.in-addr.arpa domain name pointer bl10-9-142.dsl.telepac.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.9.243.85.in-addr.arpa	name = bl10-9-142.dsl.telepac.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.247.251.2 attack
20 attempts against mh-ssh on lb-pre
2020-07-16 18:46:12
125.124.70.22 attackbots
 TCP (SYN) 125.124.70.22:47221 -> port 1347, len 44
2020-07-16 19:17:54
65.49.20.69 attackspambots
Unauthorized connection attempt detected from IP address 65.49.20.69 to port 22 [T]
2020-07-16 19:19:27
161.35.201.124 attack
(sshd) Failed SSH login from 161.35.201.124 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 16 11:10:28 amsweb01 sshd[5367]: Invalid user php from 161.35.201.124 port 54688
Jul 16 11:10:30 amsweb01 sshd[5367]: Failed password for invalid user php from 161.35.201.124 port 54688 ssh2
Jul 16 11:17:47 amsweb01 sshd[6806]: Invalid user scb from 161.35.201.124 port 34002
Jul 16 11:17:50 amsweb01 sshd[6806]: Failed password for invalid user scb from 161.35.201.124 port 34002 ssh2
Jul 16 11:21:52 amsweb01 sshd[7542]: Invalid user webmaster from 161.35.201.124 port 51046
2020-07-16 18:51:03
104.44.141.85 attack
Jul 16 12:40:16 mout sshd[31203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.44.141.85  user=root
Jul 16 12:40:18 mout sshd[31203]: Failed password for root from 104.44.141.85 port 54418 ssh2
2020-07-16 18:59:17
222.186.190.17 attackspambots
Jul 16 11:11:41 vps-51d81928 sshd[17125]: Failed password for root from 222.186.190.17 port 59097 ssh2
Jul 16 11:11:43 vps-51d81928 sshd[17125]: Failed password for root from 222.186.190.17 port 59097 ssh2
Jul 16 11:11:47 vps-51d81928 sshd[17125]: Failed password for root from 222.186.190.17 port 59097 ssh2
Jul 16 11:12:37 vps-51d81928 sshd[17159]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.17  user=root
Jul 16 11:12:38 vps-51d81928 sshd[17159]: Failed password for root from 222.186.190.17 port 31721 ssh2
...
2020-07-16 19:17:28
49.248.215.5 attack
Jul 16 09:16:20 vlre-nyc-1 sshd\[32087\]: Invalid user hanna from 49.248.215.5
Jul 16 09:16:20 vlre-nyc-1 sshd\[32087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.215.5
Jul 16 09:16:22 vlre-nyc-1 sshd\[32087\]: Failed password for invalid user hanna from 49.248.215.5 port 41172 ssh2
Jul 16 09:21:54 vlre-nyc-1 sshd\[32226\]: Invalid user qwerty from 49.248.215.5
Jul 16 09:21:54 vlre-nyc-1 sshd\[32226\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.248.215.5
...
2020-07-16 19:21:19
159.203.227.26 attackbotsspam
C1,WP GET /suche/wordpress/wp-login.php
2020-07-16 18:59:04
40.117.117.166 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-16 19:12:35
134.175.191.248 attackbotsspam
Jul 16 12:11:23 sxvn sshd[96693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.191.248
2020-07-16 19:13:22
112.105.37.24 attack
DATE:2020-07-16 10:28:37, IP:112.105.37.24, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-07-16 19:13:51
191.233.232.251 attackbotsspam
DATE:2020-07-16 09:19:42,IP:191.233.232.251,MATCHES:11,PORT:ssh
2020-07-16 18:52:05
187.174.65.4 attack
Jul 16 08:09:58 ns392434 sshd[13774]: Invalid user support from 187.174.65.4 port 33092
Jul 16 08:09:58 ns392434 sshd[13774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.65.4
Jul 16 08:09:58 ns392434 sshd[13774]: Invalid user support from 187.174.65.4 port 33092
Jul 16 08:10:00 ns392434 sshd[13774]: Failed password for invalid user support from 187.174.65.4 port 33092 ssh2
Jul 16 08:20:09 ns392434 sshd[14104]: Invalid user stuart from 187.174.65.4 port 41226
Jul 16 08:20:09 ns392434 sshd[14104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.174.65.4
Jul 16 08:20:09 ns392434 sshd[14104]: Invalid user stuart from 187.174.65.4 port 41226
Jul 16 08:20:11 ns392434 sshd[14104]: Failed password for invalid user stuart from 187.174.65.4 port 41226 ssh2
Jul 16 08:24:18 ns392434 sshd[14274]: Invalid user deployer from 187.174.65.4 port 55488
2020-07-16 18:52:57
43.241.238.152 attackspambots
Invalid user ubuntu from 43.241.238.152 port 35917
2020-07-16 18:59:39
149.56.132.202 attackspambots
Invalid user iview from 149.56.132.202 port 46686
2020-07-16 19:13:08

Recently Reported IPs

119.41.201.28 112.124.38.93 117.206.110.161 183.224.155.221
113.99.236.72 27.5.46.157 176.85.33.103 178.221.218.167
193.233.82.39 85.112.58.29 172.241.112.115 125.44.216.231
213.82.129.206 103.89.59.195 45.182.115.6 191.10.6.111
124.163.241.179 134.249.180.114 198.211.37.11 123.164.144.60